咨询与建议

限定检索结果

文献类型

  • 643 篇 会议
  • 85 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 730 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 495 篇 工学
    • 249 篇 计算机科学与技术...
    • 186 篇 软件工程
    • 125 篇 信息与通信工程
    • 93 篇 电子科学与技术(可...
    • 76 篇 机械工程
    • 73 篇 仪器科学与技术
    • 72 篇 控制科学与工程
    • 31 篇 网络空间安全
    • 30 篇 生物工程
    • 25 篇 动力工程及工程热...
    • 24 篇 电气工程
    • 23 篇 生物医学工程(可授...
    • 22 篇 光学工程
    • 18 篇 安全科学与工程
    • 16 篇 化学工程与技术
    • 13 篇 交通运输工程
  • 131 篇 理学
    • 54 篇 数学
    • 31 篇 生物学
    • 30 篇 物理学
    • 29 篇 系统科学
    • 18 篇 统计学(可授理学、...
  • 130 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 36 篇 医学
    • 28 篇 临床医学
    • 22 篇 基础医学(可授医学...
    • 15 篇 公共卫生与预防医...
    • 14 篇 药学(可授医学、理...
  • 18 篇 法学
    • 18 篇 社会学
  • 14 篇 教育学
    • 13 篇 教育学
  • 12 篇 农学
  • 9 篇 文学
  • 5 篇 经济学
  • 4 篇 军事学
  • 4 篇 艺术学

主题

  • 21 篇 accuracy
  • 20 篇 feature extracti...
  • 18 篇 cloud computing
  • 16 篇 computational mo...
  • 16 篇 real-time system...
  • 14 篇 computer science
  • 14 篇 deep learning
  • 13 篇 convolutional ne...
  • 10 篇 machine learning
  • 9 篇 authentication
  • 9 篇 monitoring
  • 9 篇 security
  • 8 篇 internet of thin...
  • 8 篇 medical services
  • 8 篇 data mining
  • 8 篇 wireless sensor ...
  • 8 篇 artificial intel...
  • 8 篇 data models
  • 8 篇 training
  • 7 篇 support vector m...

机构

  • 5 篇 korea
  • 5 篇 institute of inf...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of mathemat...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of engineer...
  • 4 篇 dept.of informat...
  • 3 篇 graduate school ...
  • 3 篇 dept.of computer...
  • 3 篇 university of hy...
  • 3 篇 school of inform...
  • 3 篇 dept.of computer...
  • 3 篇 dayananda sagar ...
  • 3 篇 hyogo
  • 3 篇 dept.of electron...
  • 3 篇 dept.of computer...
  • 3 篇 dept.of electron...
  • 3 篇 dept of computer...

作者

  • 9 篇 hae-young bae
  • 5 篇 dong-wook lee
  • 5 篇 johan e.carlson
  • 4 篇 fangmin li
  • 4 篇 shinping r.wang
  • 4 篇 yang xiao
  • 4 篇 yonghong li
  • 4 篇 guangzhi qu
  • 4 篇 weijun liu
  • 4 篇 fu-chien kao
  • 4 篇 ling tang
  • 4 篇 shunling chen
  • 4 篇 yun-kai lin
  • 4 篇 chih-chia chen
  • 4 篇 jesper martinsso...
  • 4 篇 kiseon kim
  • 3 篇 ali mohamad abou
  • 3 篇 lara hamawy
  • 3 篇 masakazu morimot...
  • 3 篇 hansen john h.l.

语言

  • 693 篇 英文
  • 25 篇 其他
  • 11 篇 中文
  • 1 篇 日文
检索条件"机构=Dept.of Computer Science& Engineering"
730 条 记 录,以下是331-340 订阅
排序:
A Real-time Hand Gesture Recognition Technique and Its Application to Music Display System
A Real-time Hand Gesture Recognition Technique and Its Appli...
收藏 引用
2015 7th International Conference on computer Research and Development (ICCRD 2015)
作者: Jun-YongLee Joong-EunJung Ho-Joon Kim Dept.of Computer Science and Electrical Engineering Handing University
Inthe paper, we introduce a real-time hand gesture recognition method using a neural network. The underlying system is an automatic music display system which consists of three modules;feature extraction module, patte... 详细信息
来源: 评论
Semi-automatic Lexicalized Tree Adjoining Grammar Extraction towards Natural Language Generation
Semi-automatic Lexicalized Tree Adjoining Grammar Extraction...
收藏 引用
2015 International Conference on Automation,Mechanical Control and Computational engineering(AMCCE 2015)
作者: Wei QIU Tianfang YAO Dept.of Computer Science and Engineering Shanghai Jiao Tong University
Deep grammar Formalism such as Tree Adjoining Grammar(TAG) is widely used in Natural Language Generation(NLG). However, crafting the grammar not only requires expert knowledge of both the grammar formalism and the tar... 详细信息
来源: 评论
Effects of Electromagnetic Waves on Brainwaves under Logically Reasoning Status
Effects of Electromagnetic Waves on Brainwaves under Logical...
收藏 引用
2015 International Industrial Informatics and computer engineering Conference(IIICEC 2015)
作者: Fu-Chien Kao Shinping R.Wang Chih-Chia Chen Yun-Kai Lin Chih-Hsun Huang Dept.of Computer Science & Information Engineering Da-Yeh University
Nowadays,Wi Fi becomes a popular wireless accessory method to most of *** use Wi Fi to interact with the wireless Internet,perform commercial and financial transactions,or conducting recreational activities,*** it off... 详细信息
来源: 评论
Partition-based Parallel Hybrid Optical Proximity Correction
Partition-based Parallel Hybrid Optical Proximity Correction
收藏 引用
2015 International Conference on Power Electronics and Energy engineering(PEEE 2015)
作者: C.H.Su C.S.Huang T.M.Hsieh Y.C.Lin Dept.of Information and Computer Engineering Chung Yuan University Dept.of Electronic Engineering Lunghwa University of Science and Technology Dept.of Multimedia and M-Commerce Kainan University
With the progress of IC manufacturing, the pattern size of IC has been shrunk. Once the pattern size on the mask is smaller than the wavelength of IC optical lithography, the chip variation(Optical proximity effect) m... 详细信息
来源: 评论
Jamming Attack in Centralized State Estimation
Jamming Attack in Centralized State Estimation
收藏 引用
第三十四届中国控制会议
作者: Chao Yang Xiaoqiang Ren Wen Yang Hongbo Shi Ling Shi Key Laboratory of Advanced Control and Optimization for Chemical Processes Dept.of Automation East China University of Science and Technology Dept.of Electronic and Computer Engineering Hong Kong University of Science and Technology
To understand the behavior of potential network invaders, this paper considers a system attack problem from the perspective of an invader. The invader intends to attack a system, where a group of sensors measure a pro... 详细信息
来源: 评论
Inter-WBAN Coexistence and Interference Mitigation
收藏 引用
ZTE Communications 2015年 第2期13卷 28-35页
作者: Bin Liu Xiaosong Zhao Lei Zou Chang Wen Chen Key Laboratory of Electromagnetic Space Information Chinese Academy of Sciences University of Science and Technology of China Dept.of Computer Science and Engineering The State University of New York at Buffalo
With promising applications in e-health and entertainment, wireless body area networks (WBANs) have attracted the interest of both academia and industry. If WBANs are densely deployed within a small area, serious pr... 详细信息
来源: 评论
A novel approach for imputation of missing values for mining medical datasets
A novel approach for imputation of missing values for mining...
收藏 引用
IEEE International Conference on Computational Intelligence and Computing Research
作者: Yelipe UshaRani P. Sammulal Department of Information Technology VNR VJIET Hyderabad INDIA Dept.of Computer Science and Engineering JNT University Karimnagar INDIA
Imputation of missing attribute values in medical datasets for extracting hidden knowledge from medical datasets is an interesting research topic of interest which is very challenging. One cannot eliminate missing val... 详细信息
来源: 评论
Empirical Evaluation of Information Leakage Detection Using Net-flow Analysis
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2014年 第6期21卷 16-21页
作者: Jing Xu Fei Xu Xiao-Jun Chen Jin-Qiao Shi Cheng Qi Institute of Information Engineering Chinese Academy of Sciences Dept.of Computer Science Beijing University of Technology
Because of the widespread of Trojans,organizations and Internet users become more vulnerable to the threat of information *** paper describes an information leakage detection system( ILDS) to detect sensitive informat... 详细信息
来源: 评论
The effects of foot and leg motor imageries on sensorimotor rhythms in EEG
The effects of foot and leg motor imageries on sensorimotor ...
收藏 引用
The Society of Instrument and Control Engineers Annual Conference 2015
作者: Kosuke Kitahara Toshiyuki Kondo Dept.of Computer and Information Sciences Graduate School of EngineeringTokyo University of Agriculture and Technology Division of Advanced Information Technology and Computer Science Institute of EngineeringTokyo University of Agriculture and Technology
For the sake of brain-computer interfaces(BCIs) neurorehabilitation, an EEG feature, event-related(de)-synchronization(ERD/S) caused by motor imagery(MI) is widely used. However, its availability and reliability are l... 详细信息
来源: 评论
Cloud Foren:A Novel Framework for Digital Forensics in Cloud Computing
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2014年 第6期21卷 39-45页
作者: Mathew Nyamagwa Jigang Liu Anyi Liu Tetsutaro Uehara Dept.of Information and Computer Sciences Metropolitan State UniversitySaint Paul 55106USA Dept.of Computer Science Indiana University Purdue University Fort WayneFort Wayne 46805IndiananUSA Dept.of Computer Science College of Information Science & EngineeringRitsumeikan UniversityKusatsu 525875 5ShigaJapan
Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or *** cloud compu... 详细信息
来源: 评论